Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

212 résultats

Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions

Qing Yang , Rongxing Lu , Chunming Rong , Yacine Challal , Maryline Laurent , et al.
IEEE Internet of Things Journal, 2019, 6 (3), pp.4556-4560. ⟨10.1109/JIOT.2019.2921235⟩
Article dans une revue hal-02315884v1
Image document

Overcoming DNSSEC performance issues with DHT-based architectures

Daniel Migault , Stanislas Francfort , Stéphane Sénécal , Emmanuel Herbert , Maryline Laurent
IM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.816-819
Communication dans un congrès hal-00860147v1
Image document

PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds

Sana Belguith , Nesrine Kaaniche , Abderrazak Jemai , Maryline Laurent , Rabah Attia
SECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.133 - 146, ⟨10.5220/0005968201330146⟩
Communication dans un congrès hal-01391253v1

Privacy management and protection of personal data

Maryline Laurent , Claire Levallois-Barth
Digital identity management, ISTE Press; Elsevier, pp.137 - 205, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50004-3⟩
Chapitre d'ouvrage hal-01272029v1

A secure Peer-to-Peer backup system

Houssem Jarraya , Maryline Laurent
NOTERE 2008 : 8ème conférence internationale sur les nouvelles technologies de la répartition, Jun 2008, Lyon, France. pp.125 - 134, ⟨10.1145/1416729.1416751⟩
Communication dans un congrès hal-01379960v1
Image document

Technical enforcement of european privacy legislation: an access control approach

Kheira Bekara , Maryline Laurent , Than Ha Nguyen
NTMS 2012 : 5th IFIP International Conference on New Technologies, Mobility and Security , May 2012, Istanbul, Turkey. pp.1 - 7, ⟨10.1109/NTMS.2012.6208724⟩
Communication dans un congrès hal-01300733v1

Security, and privacy in emerging wireless networks : security and communication networks journal

Qing Yang , Rongxing Lu , Yacine Challal , Maryline Laurent
Wiley; Hindawi Limited, 2017, Security and Communication Networks Journal, Security and Communication Networks Journal
Ouvrages hal-01682207v1

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

Nesrine Kaaniche , Maryline Laurent
Computer Communications, 2017, 111, pp.120 - 141. ⟨10.1016/j.comcom.2017.07.006⟩
Article dans une revue hal-01576979v1
Image document

Sécurité dans les réseaux de capteurs sans fil : conception et implémentation

Wassim Drira , Chakib Bekara , Maryline Laurent
[Rapport de recherche] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.55
Rapport hal-01373430v1
Image document

Prov-trust: towards a trustworthy SGX-based data provenance system

Nesrine Kaaniche , Sana Belguith , Maryline Laurent , Ashish Gehani , Giovanni Russello
17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩
Communication dans un congrès hal-03991163v1
Image document

Novel lightweight signcryption-based key distribution mechanisms for MIKEY

Kim Thuat Nguyen , Nouha Ouahla , Maryline Laurent
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Communication dans un congrès hal-01391308v1
Image document

SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact information

Souha Masmoudi , Maryline Laurent , Nesrine Kaaniche
Communications in Computer and Information Science, 2023, Communications in Computer and Information Science, 1849, pp.1-19. ⟨10.1007/978-3-031-45137-9_1⟩
Article dans une revue hal-04227767v1
Image document

An EAP-EHash authentication method adapted to resource constrained terminals

Omar Cheikhrouhou , Maryline Laurent , Amin Ben Abdallah , Maher Ben Jemaa
Annals of Telecommunications - annales des télécommunications, 2009, 65 (5), pp.271 - 284. ⟨10.1007/s12243-009-0135-9⟩
Article dans une revue hal-00506549v1
Image document

Questioning the security and efficiency of the ESIoT approach

Aida Diop , Said Gharout , Maryline Laurent , Jean Leneutre , Jacques Traoré
WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.202 - 207, ⟨10.1145/3212480.3212491⟩
Communication dans un congrès hal-01850383v1
Image document

Building trust through risk management in computer science

Maryline Laurent , Armen Khatchatourov
Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.48-59, 2018, 978-2-9557308-6-7
Chapitre d'ouvrage hal-02516151v1
Image document

Is blockchain a trustworthy technology?

Maryline Laurent
Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.180-197, 2018, 978-2-9557308-6-7
Chapitre d'ouvrage hal-02516126v1

PCS, a privacy-preserving certification scheme

Nesrine Kaaniche , Maryline Laurent , Pierre Olivier Rocher , Christophe Kiennert , Joaquin Garcia-Alfaro
DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway
Communication dans un congrès hal-01702450v1

Key management in wireless sensor networks

Chakib Bekara , Maryline Laurent
Wireless and mobile network security, ISTE / Wiley, pp.613 - 648, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch16⟩
Chapitre d'ouvrage hal-00472923v1
Image document

H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacks

Chakib Bekara , Maryline Laurent , Kheira Bekara
ICCS 2008 : 11th IEEE International Conference on Communication Systems, Nov 2008, Guangzhou, China. pp.1197 - 1203 ⟨10.1109/ICCS.2008.4737372⟩
Communication dans un congrès hal-01327378v1

A validated privacy-utility preserving recommendation system with local differential privacy

Seryne Rahali , Maryline Laurent , Charles Roux , Brice Mazeau , Souha Masmoudi
2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩
Communication dans un congrès hal-03754064v1
Image document

Toward a new ad hoc node design for secure service deployment over ad hoc network

Hakima Chaouchi , Maryline Laurent
MWNS 2008 : Workshop on Mobile and Wireless Networks Security, May 2008, Singapore, Singapore. pp.1 - 11, ⟨10.1142/9789812833266_0001⟩
Communication dans un congrès hal-01355075v1

Mécanismes de sécurité fondamentaux

Maryline Laurent , Hakima Chaouchi , Olivier Paul
La sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux, Hermes Science : Lavoisier, pp.89 - 147, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1697-6
Chapitre d'ouvrage hal-01328102v1

Les identités numériques

Maryline Laurent , Julie Denouël , Claire Levallois-Barth , Patrick Waelbroeck
La gestion des identités numériques, ISTE Edition, pp.19 - 90, 2015, Systèmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6
Chapitre d'ouvrage hal-01263060v1

La gestion des identités numériques

Maryline Laurent , Samia Bouzefrane
ISTE. pp.340, 2014, à paraître
Ouvrages hal-01126448v1
Image document

Authorized keyword search over outsourced encrypted data in cloud environment

Nazatul Haque Sultan , Nesrine Kaaniche , Maryline Laurent , Ferdous Ahmed Barbhuiya
IEEE Transactions on Cloud Computing, 2022, 10 (1), pp.216-233. ⟨10.1109/tcc.2019.2931896⟩
Article dans une revue hal-03991044v1

CoRA: a scalable Collective Remote Attestation protocol for sensor networks

Aida Diop , Maryline Laurent , Jean Leneutre , Jacques Traoré
ICISSP 2020: 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valletta, Malta. pp.84-95, ⟨10.5220/0008962700840095⟩
Communication dans un congrès hal-03024074v1

Privacy-by-design in intelligent infrastructures

Manon Knockaert , Maryline Laurent , Lukas Malina , Raimundas Matulevičius , Marinella Petrocchi , et al.
Deep diving into data protection: 1979-2019: celebrating 40 years of research on privacy data protection at the CRIDS, 170 (51), Collection du CRIDS, pp.309-343, 2021, 9782807926493
Chapitre d'ouvrage hal-04331489v1
Image document

A new protocol for securing wireless sensor networks against nodes replication attacks

Chakib Bekara , Maryline Laurent
3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), Oct 2007, White Plains, Ny, United States. pp.59 - ⟨10.1109/WIMOB.2007.4390853⟩
Communication dans un congrès hal-01355352v1

Wireless sensor network security

José-Marcos Nogueira , Hao-Chi Wong , Antonio Alfredo F. Loureiro , Chakib Bekara , Maryline Laurent , et al.
Wireless and mobile networks security, ISTE/John Wiley & Sons, pp.565 - 612, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch15⟩
Chapitre d'ouvrage hal-01359532v1

La confiance en informatique par la gestion du risque

Maryline Laurent , Armen Khatchatourov
Signes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.47 - 62, 2018, 978-2-9557308-4-3
Chapitre d'ouvrage hal-01773953v1